Atsuo Inomata

Orcid: 0000-0002-7723-6471

According to our database1, Atsuo Inomata authored at least 42 papers between 2004 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
On Collecting Onion Server Fingerprints and Identification of Their Operators.
Proceedings of the 23rd IEEE International Conference on Software Quality, 2023

2022
On the Feasibility of Linking Attack to Google/Apple Exposure Notification Framework.
Proc. Priv. Enhancing Technol., 2022

Code Aggregate Graph: Effective Representation for Graph Neural Networks to Detect Vulnerable Code.
IEEE Access, 2022

2021
Enhancing Digital Certificate Usability in Long Lifespan IoT Devices by Utilizing Private CA.
Secur. Commun. Networks, 2021

Migrating to Zero Trust Architecture: Reviews and Challenges.
Secur. Commun. Networks, 2021

A Secure Cloud-centric IoT Framework for Smart Device Registration.
J. Inf. Process., 2021

The Proposal of Double Agent Architecture using Actor-critic Algorithm for Penetration Testing.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021

The Comparison of Word Embedding Techniques in RNNs for Vulnerability Detection.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021

2020
Evaluation to Classify Ransomware Variants based on Correlations between APIs.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

2019
Implementation and Evaluation of a Multi-Factor Web Authentication System with Individual Number Card and WebUSB.
Proceedings of the 20th Asia-Pacific Network Operations and Management Symposium, 2019

2017
Fast Modular Arithmetic on the Kalray MPPA-256 Processor for an Energy-Efficient Implementation of ECM.
IEEE Trans. Computers, 2017

A Weil Pairing on a Family of Genus 2 Hyperelliptic Curves with Efficiently Computable Automorphisms.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

Proposal of hardware device model for IoT endpoint security and its implementation.
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops, 2017

2016
A Construction of a Twisted Ate Pairing on a Family of Kawazoe-Takahashi Curves at 192-bit Security Level and Its Cost Estimate.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

2015
Security, Privacy, and Applications in Mobile Healthcare.
Int. J. Distributed Sens. Networks, 2015

A vehicle clustering algorithm for information propagation by inter-vehicle communications.
Proceedings of the 2015 IEEE International Conference on Pervasive Computing and Communication Workshops, 2015

2013
Wide-Area Publish/Subscribe Mobile Resource Discovery Based on IPv6 GeoNetworking.
IEICE Trans. Commun., 2013

Location tracking prevention with dummy messages for vehicular communications.
Proceedings of the 13th International Conference on ITS Telecommunications, 2013

Vehicle clustering algorithm for sharing information on traffic congestion.
Proceedings of the 13th International Conference on ITS Telecommunications, 2013

TrafficCam: Sharing traffic information based on dynamic IPv6 multicast group assignment using smartphone sensors.
Proceedings of the 10th IEEE Consumer Communications and Networking Conference, 2013

A Two-tier Overlay Publish/Subscribe System for Sensor Data Stream Using Geographic Based Load Balancing.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

2012
Design and field evaluation of geographical location-aware service discovery on IPv6 GeoNetworking for VANET.
EURASIP J. Wirel. Commun. Netw., 2012

Koshien-Cloud: Operations of Distributed Cloud as a Large Scale Web Contents Distribution Platform.
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet, 2012

A Divide and Merge Method for Sensor Data Processing on Large-Scale Publish/Subscribe Systems.
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet, 2012

2011
Proposal and Evaluation of a Dynamic Resource Allocation Method Based on the Load of VMs on IaaS.
Proceedings of the 4th IFIP International Conference on New Technologies, 2011

Experimental Research on Personal Awareness and Behavior for Information Security Protection.
Proceedings of the 14th International Conference on Network-Based Information Systems, 2011

Session-wise private data exchange in eHealth peer-to-peer database management systems.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

Communication trials for Self-Mutual Help on the emergency situations in ∊-ARK.
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011

2010
FPGA and ASIC implementations of the eta<sub>T</sub> pairing in characteristic three.
Comput. Electr. Eng., 2010

Proposal of Smooth Switching Mechanism on P2P Streaming.
Proceedings of the Distributed Computing and Artificial Intelligence, 2010

The ε-ARK Device Family for the Emergency Situations.
Proceedings of the 7th IEEE Consumer Communications and Networking Conference, 2010

2009
Total solar eclipse: fish-eye 4K image transmission experimentation on the internet.
Proceedings of the International Conference on Computer Graphics and Interactive Techniques, 2009

Uncompressed 4K2K and HD live transmission on global internet.
Proceedings of the International Conference on Computer Graphics and Interactive Techniques, 2009

MetaFa: Metadata Management Framework for Data Sharing in Data-Intensive Applications.
Proceedings of the Distributed Computing, 2009

Efficient Data Management using the Session Log in DHT and its Evaluation.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

2008
Anonymous authentication and secure communication protocol for wireless mobile <i>ad hoc</i> networks.
Secur. Commun. Networks, 2008

Private Communication and Authentication Protocol for Wireless Sensor Networks.
Proceedings of the NTMS 2008, 2008

Distributed data access/find system with metadata for data-intensive computing.
Proceedings of the 9th IEEE/ACM International Conference on Grid Computing (Grid 2008), Tsukuba, Japan, September 29, 2008

2006
Anonymous Secure Communication in Wireless Mobile Ad-hoc Networks.
IACR Cryptol. ePrint Arch., 2006

An Anonymous On-Demand Position-Based Routing in Mobile Ad Hoc Networks.
Proceedings of the 2006 International Symposium on Applications and the Internet (SAINT 2006), 2006

2005
A Proposal of Short Proxy Signature using Pairing.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

2004
Anonymous traceable disclosure scheme using pairing over elliptic curve.
Proceedings of the 3rd International Conference on Information Security, 2004


  Loading...